public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2023-12-19 14:09:01 to 2023-12-21 09:51:13 UTC [more...]

[RFC PATCH 0/3] RISC-V: KVM: Guest Debug Support
 2023-12-21  9:50 UTC  (2+ messages)
` [RFC PATCH 2/3] RISC-V: KVM: Implement kvm_arch_vcpu_ioctl_set_guest_debug()

[PATCH v4 00/11] RISCV: Add kvm Sstc timer selftests
 2023-12-21  9:25 UTC  (9+ messages)
` [PATCH v4 11/11] KVM: selftests: Enable tunning of err_margin_us in arch timer test

[PATCH v8 00/26] Enable CET Virtualization
 2023-12-21 14:02 UTC  (27+ messages)
` [PATCH v8 01/26] x86/fpu/xstate: Always preserve non-user xfeatures/flags in __state_perm
` [PATCH v8 02/26] x86/fpu/xstate: Refine CET user xstate bit enabling
` [PATCH v8 03/26] x86/fpu/xstate: Add CET supervisor mode state support
` [PATCH v8 04/26] x86/fpu/xstate: Introduce XFEATURE_MASK_KERNEL_DYNAMIC xfeature set
` [PATCH v8 05/26] x86/fpu/xstate: Introduce fpu_guest_cfg for guest FPU configuration
` [PATCH v8 06/26] x86/fpu/xstate: Create guest fpstate with guest specific config
` [PATCH v8 07/26] x86/fpu/xstate: Warn if kernel dynamic xfeatures detected in normal fpstate
` [PATCH v8 08/26] KVM: x86: Rework cpuid_get_supported_xcr0() to operate on vCPU data
` [PATCH v8 09/26] KVM: x86: Rename kvm_{g,s}et_msr() to menifest emulation operations
` [PATCH v8 10/26] KVM: x86: Refine xsave-managed guest register/MSR reset handling
` [PATCH v8 11/26] KVM: x86: Add kvm_msr_{read,write}() helpers
` [PATCH v8 12/26] KVM: x86: Report XSS as to-be-saved if there are supported features
` [PATCH v8 13/26] KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS
` [PATCH v8 14/26] KVM: x86: Initialize kvm_caps.supported_xss
` [PATCH v8 15/26] KVM: x86: Load guest FPU state when access XSAVE-managed MSRs
` [PATCH v8 16/26] KVM: x86: Add fault checks for guest CR4.CET setting
` [PATCH v8 17/26] KVM: x86: Report KVM supported CET MSRs as to-be-saved
` [PATCH v8 18/26] KVM: VMX: Introduce CET VMCS fields and control bits
` [PATCH v8 19/26] KVM: x86: Use KVM-governed feature framework to track "SHSTK/IBT enabled"
` [PATCH v8 20/26] KVM: VMX: Emulate read and write to CET MSRs
` [PATCH v8 21/26] KVM: x86: Save and reload SSP to/from SMRAM
` [PATCH v8 22/26] KVM: VMX: Set up interception for CET MSRs
` [PATCH v8 23/26] KVM: VMX: Set host constant supervisor states to VMCS fields
` [PATCH v8 24/26] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
` [PATCH v8 25/26] KVM: nVMX: Introduce new VMX_BASIC bit for event error_code delivery to L1
` [PATCH v8 26/26] KVM: nVMX: Enable CET support for nested guest

[PATCH v3 0/6] target/i386: add support for FRED
 2023-12-21  8:27 UTC  (3+ messages)
` [PATCH v3 1/6] target/i386: add support for FRED in CPUID enumeration

[PATCH 0/2] x86: KVM: Limit guest physical bits when 5-level EPT is unsupported
 2023-12-21  8:19 UTC  (16+ messages)
` [PATCH 1/2] "
` [PATCH 2/2] x86: KVM: Emulate instruction when GPA can't be translated by EPT

[PATCH vhost v4 00/15] vdpa/mlx5: Add support for resumable vqs
 2023-12-21  7:46 UTC  (36+ messages)
` [PATCH mlx5-vhost v4 01/15] vdpa/mlx5: Expose resumable vq capability
` [PATCH vhost v4 02/15] vdpa: Add VHOST_BACKEND_F_CHANGEABLE_VQ_ADDR_IN_SUSPEND flag
` [PATCH vhost v4 03/15] vdpa: Add VHOST_BACKEND_F_CHANGEABLE_VQ_STATE_IN_SUSPEND flag
` [PATCH vhost v4 04/15] vdpa: Accept VHOST_BACKEND_F_CHANGEABLE_VQ_ADDR_IN_SUSPEND backend feature
` [PATCH vhost v4 05/15] vdpa: Accept VHOST_BACKEND_F_CHANGEABLE_VQ_STATE_IN_SUSPEND "
` [PATCH vhost v4 06/15] vdpa: Track device suspended state
` [PATCH vhost v4 07/15] vdpa: Block vq address change in DRIVER_OK unless device supports it
` [PATCH vhost v4 08/15] vdpa: Block vq state "
` [PATCH vhost v4 09/15] vdpa/mlx5: Allow modifying multiple vq fields in one modify command
` [PATCH vhost v4 10/15] vdpa/mlx5: Introduce per vq and device resume
` [PATCH vhost v4 11/15] vdpa/mlx5: Mark vq addrs for modification in hw vq
` [PATCH vhost v4 12/15] vdpa/mlx5: Mark vq state "
` [PATCH vhost v4 13/15] vdpa/mlx5: Use vq suspend/resume during .set_map
` [PATCH vhost v4 14/15] vdpa/mlx5: Introduce reference counting to mrs
` [PATCH vhost v4 15/15] vdpa/mlx5: Add mkey leak detection

[Bug 218297] New: Kernel Panic and crash
 2023-12-21  7:27 UTC  (3+ messages)
` [Bug 218297] "

[PATCH v3 00/70] QEMU Guest memfd + QEMU TDX support
 2023-12-21  6:18 UTC  (9+ messages)
` [PATCH v3 06/70] kvm: Introduce support for memory_attributes
` [PATCH v3 09/70] physmem: Introduce ram_block_convert_range() for page conversion

[PATCH v2 0/3] KVM: X86: Make bus clock frequency for vapic timer configurable
 2023-12-21  5:44 UTC  (12+ messages)
` [PATCH v2 1/3] KVM: x86: Make the hardcoded APIC bus frequency vm variable

[PATCH v3 0/4] KVM: X86: Make bus clock frequency for vapic timer configurable
 2023-12-21  5:34 UTC  (5+ messages)
` [PATCH v3 1/4] KVM: x86/hyperv: Calculate APIC bus frequency for hyper-v
` [PATCH v3 2/4] KVM: x86: Make the APIC bus cycles per nsec VM variable

[RFC PATCH] KVM: Introduce KVM VIRTIO device
 2023-12-21  2:44 UTC  (7+ messages)

[PATCH net-next v3 0/3] Abstract page from net stack
 2023-12-20 21:45 UTC  (4+ messages)
` [PATCH net-next v3 1/3] vsock/virtio: use skb_frag_*() helpers
` [PATCH net-next v3 2/3] net: introduce abstraction for network memory
` [PATCH net-next v3 3/3] net: add netmem_ref to skb_frag_t

[PATCH] kvm: fix kvmalloc_array() arguments order
 2023-12-20 17:30 UTC 

[PATCH v10 00/50] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2023-12-20  7:07 UTC  (16+ messages)
` [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
` [PATCH v10 07/50] x86/sev: Add RMP entry lookup helpers
` [PATCH v10 08/50] x86/fault: Add helper for dumping RMP entries
` [PATCH v10 11/50] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH v10 17/50] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled

[PATCH vfio] vfio/virtio: Declare virtiovf_pci_aer_reset_done() static
 2023-12-20 15:32 UTC  (2+ messages)

[PATCH v7 00/16] Add Secure TSC support for SNP guests
 2023-12-20 15:13 UTC  (17+ messages)
` [PATCH v7 01/16] virt: sev-guest: Use AES GCM crypto library
` [PATCH v7 02/16] virt: sev-guest: Replace dev_dbg with pr_debug
` [PATCH v7 03/16] virt: sev-guest: Add SNP guest request structure
` [PATCH v7 04/16] virt: sev-guest: Add vmpck_id to snp_guest_dev struct
` [PATCH v7 05/16] x86/sev: Cache the secrets page address
` [PATCH v7 06/16] virt: sev-guest: Move SNP Guest command mutex
` [PATCH v7 07/16] x86/sev: Move and reorganize sev guest request api
` [PATCH v7 08/16] x86/mm: Add generic guest initialization hook
` [PATCH v7 09/16] x86/cpufeatures: Add synthetic Secure TSC bit
` [PATCH v7 10/16] x86/sev: Add Secure TSC support for SNP guests
` [PATCH v7 11/16] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
` [PATCH v7 12/16] x86/sev: Prevent RDTSC/RDTSCP interception "
` [PATCH v7 13/16] x86/kvmclock: Skip kvmclock when Secure TSC is available
` [PATCH v7 14/16] x86/sev: Mark Secure TSC as reliable
` [PATCH v7 15/16] x86/cpu/amd: Do not print FW_BUG for Secure TSC
` [PATCH v7 16/16] x86/sev: Enable Secure TSC for SNP guests

[PATCH v4 0/3] kvm: arm64: allow the VM to select DEVICE_* and NORMAL_NC for IO memory
 2023-12-20 14:16 UTC  (6+ messages)
` [PATCH v4 1/3] kvm: arm64: introduce new flag for non-cacheable "
` [PATCH v4 2/3] kvm: arm64: set io memory s2 pte as normalnc for vfio pci devices

[PATCH v2] KVM: s390: vsie: fix race during shadow creation
 2023-12-20 13:12 UTC  (3+ messages)

[PATCH] KVM: s390: vsie: fix race during shadow creation
 2023-12-20 13:11 UTC  (6+ messages)

[PATCH v6 0/6] iommufd: Add nesting infrastructure (part 2/2)
 2023-12-20 11:23 UTC  (4+ messages)

[PATCH v4 0/4] KVM: s390: Fix minor bugs in STFLE shadowing
 2023-12-20 10:48 UTC  (9+ messages)
` [PATCH v4 1/4] KVM: s390: vsie: Fix STFLE interpretive execution identification
` [PATCH v4 2/4] KVM: s390: vsie: Fix length of facility list shadowed
` [PATCH v4 3/4] KVM: s390: cpu model: Use proper define for facility mask size
` [PATCH v4 4/4] KVM: s390: Minor refactor of base/ext facility lists

[PATCH] LoongArch: KVM: Fix build due to API changes
 2023-12-20  3:40 UTC  (3+ messages)

linux-next: manual merge of the kvm tree with the block tree
 2023-12-20  2:52 UTC 

[PATCH v11 00/19] KVM: xen: update shared_info and vcpu_info handling
 2023-12-20  2:40 UTC  (22+ messages)
` [PATCH v11 01/19] KVM: pfncache: Add a map helper function
` [PATCH v11 02/19] KVM: pfncache: remove unnecessary exports
` [PATCH v11 03/19] KVM: xen: mark guest pages dirty with the pfncache lock held
` [PATCH v11 04/19] KVM: pfncache: add a mark-dirty helper
` [PATCH v11 05/19] KVM: pfncache: remove KVM_GUEST_USES_PFN usage
` [PATCH v11 06/19] KVM: pfncache: stop open-coding offset_in_page()
` [PATCH v11 07/19] KVM: pfncache: include page offset in uhva and use it consistently
` [PATCH v11 08/19] KVM: pfncache: allow a cache to be activated with a fixed (userspace) HVA
` [PATCH v11 09/19] KVM: xen: separate initialization of shared_info cache and content
` [PATCH v11 10/19] KVM: xen: re-initialize shared_info if guest (32/64-bit) mode is set
` [PATCH v11 11/19] KVM: xen: allow shared_info to be mapped by fixed HVA
` [PATCH v11 12/19] KVM: xen: allow vcpu_info "
` [PATCH v11 13/19] KVM: selftests / xen: map shared_info using HVA rather than GFN
` [PATCH v11 14/19] KVM: selftests / xen: re-map vcpu_info using HVA rather than GPA
` [PATCH v11 15/19] KVM: xen: advertize the KVM_XEN_HVM_CONFIG_SHARED_INFO_HVA capability
` [PATCH v11 16/19] KVM: xen: split up kvm_xen_set_evtchn_fast()
` [PATCH v11 17/19] KVM: xen: don't block on pfncache locks in kvm_xen_set_evtchn_fast()
` [PATCH v11 18/19] KVM: pfncache: check the need for invalidation under read lock first
` [PATCH v11 19/19] KVM: xen: allow vcpu_info content to be 'safely' copied

[PATCH v9 0/6] KVM: allow mapping non-refcounted pages
 2023-12-20  1:37 UTC  (5+ messages)

[ANNOUNCE] PUCK Agenda - 2023.12.20 - CANCELED
 2023-12-20  1:33 UTC 

[PATCH v9 00/14] iommu: Prepare to deliver page faults to user space
 2023-12-20  1:23 UTC  (15+ messages)
` [PATCH v9 01/14] iommu: Move iommu fault data to linux/iommu.h
` [PATCH v9 02/14] iommu/arm-smmu-v3: Remove unrecoverable faults reporting
` [PATCH v9 03/14] iommu: Remove unrecoverable fault data
` [PATCH v9 04/14] iommu: Cleanup iopf data structure definitions
` [PATCH v9 05/14] iommu: Merge iopf_device_param into iommu_fault_param
` [PATCH v9 06/14] iommu: Remove iommu_[un]register_device_fault_handler()
` [PATCH v9 07/14] iommu: Merge iommu_fault_event and iopf_fault
` [PATCH v9 08/14] iommu: Prepare for separating SVA and IOPF
` [PATCH v9 09/14] iommu: Make iommu_queue_iopf() more generic
` [PATCH v9 10/14] iommu: Separate SVA and IOPF
` [PATCH v9 11/14] iommu: Refine locking for per-device fault data management
` [PATCH v9 12/14] iommu: Use refcount for fault data access
` [PATCH v9 13/14] iommu: Improve iopf_queue_remove_device()
` [PATCH v9 14/14] iommu: Track iopf group instead of last fault

[PATCH v4 1/6] x86/bugs: Add asm helpers for executing VERW
 2023-12-20  1:25 UTC  (8+ messages)
  ` [PATCH v4 4/6] x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key
  ` [PATCH v4 6/6] KVM: VMX: Move VERW closer to VMentry for MDS mitigation

[PATCH V10 vfio 0/9] Introduce a vfio driver over virtio devices
 2023-12-19 20:49 UTC  (4+ messages)

[kvm-unit-tests PATCH v2] scripts/pretty_print_stacks.py: Silence warning from Python 3.12
 2023-12-19 15:37 UTC  (2+ messages)

[kvm-unit-tests PATCH] scripts/pretty_print_stacks.py: Silence warning from Python 3.12
 2023-12-19 15:29 UTC  (3+ messages)

[Bug 218259] New: High latency in KVM guests
 2023-12-19 15:16 UTC  (4+ messages)
` [Bug 218259] "

[PATCH vhost v2 0/8] vdpa/mlx5: Add support for resumable vqs
 2023-12-19 15:11 UTC  (20+ messages)
` [PATCH vhost v2 4/8] vdpa/mlx5: Mark vq addrs for modification in hw vq

[kvm-unit-tests PATCH v5 00/29] powerpc: updates, P10, PNV support
 2023-12-19 14:23 UTC  (5+ messages)
` [kvm-unit-tests PATCH v5 25/29] powerpc: Add rtas stop-self support
` [kvm-unit-tests PATCH v5 29/29] powerpc: Add timebase tests


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox